Information Security

181. The purpose of a fire extinguisher is:

  1. The primary device used to fight accidental fires
  2. The primary device to fight all fires until the fire department arrives
  3. The primary device used to fight all fires
  4. The primary device used to fight small fires

Correct answer: (D)
The primary device used to fight small fires

182. The purpose of a parallel test is:

  1. To determine the ability to perform live business transactions on backup systems instead of on production systems
  2. To determine the ability for a recovery test to be interrupted
  3. To determine the ability to perform live business transactions on production systems and backup systems at the same time
  4. To determine the ability for the last minute substitution of a recovery team

Correct answer: (C)
To determine the ability to perform live business transactions on production systems and backup systems at the same time

183. The purpose of a password policy that locks an account after five unsuccessful login attempts is:

  1. To prevent an intruder from carrying out a dictionary attack against a password
  2. To prevent a second user from changing the password
  3. To prevent someone from quickly cycling back to their familiar password
  4. To prevent other individuals from logging in to the account

Correct answer: (A)
To prevent an intruder from carrying out a dictionary attack against a password

184. The purpose of a password policy that requires a minimum number of days between password changes is:

  1. To prevent a brute force attack against a password
  2. To prevent an intruder from carrying out a dictionary attack against a password
  3. To prevent someone from quickly cycling back to their familiar password
  4. To prevent a second user from changing the password

Correct answer: (C)
To prevent someone from quickly cycling back to their familiar password

185. The purpose of a periodic review of user access rights is:

  1. To check whether employees have logged in to the system
  2. To check for active accounts that belong to terminated employees
  3. To determine password quality and expiration
  4. To determine whether access control systems still function properly

Correct answer: (B)
To check for active accounts that belong to terminated employees

186. The purpose of a security incident debrief is all of the following EXCEPT:

  1. Review of log files
  2. Review of technical architecture
  3. Review of operational procedures
  4. Review of technical controls

Correct answer: (A)
Review of log files

187. The purpose of a server cluster includes all of the following EXCEPT:

  1. Improve an application's availability
  2. Increase an application's capacity
  3. Increase an application's data storage
  4. Provide fault tolerance

Correct answer: (C)
Increase an application's data storage

188. The purpose of administrative laws in the U.S. is:

  1. To define courtroom and law enforcement procedures
  2. To define activities such as assault, arson, theft, burglary, bribery, and perjury
  3. To define contract, tort, property, employment, and corporate law
  4. To regulate the operation of U.S. government agencies

Correct answer: (D)
To regulate the operation of U.S. government agencies

189. The purpose of backups includes all of the following EXCEPT:

  1. Software malfunctions
  2. Human error
  3. Hardware malfunctions
  4. Cluster failovers

Correct answer: (D)
Cluster failovers

190. The purpose of Data Control Language is:

  1. Define which users are able to view and manipulate data in a database
  2. Define data structures in a relational database
  3. Define data structures in an object-oriented database
  4. Retrieve, insert, delete and update data in a relational database

Correct answer: (A)
Define which users are able to view and manipulate data in a database

Page 19 of 25